<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber Security News January 2019</title>
	<atom:link href="http://www.epanorama.net/blog/2019/01/01/cyber-security-news-january-2019/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/01/01/cyber-security-news-january-2019/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 10 May 2026 10:08:58 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/01/01/cyber-security-news-january-2019/comment-page-9/#comment-1623796</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 02 Feb 2019 08:42:33 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181258#comment-1623796</guid>
		<description><![CDATA[Ethical Hacker Exposes Magyar Telekom Vulnerabilities, Faces 8 Years in Jail
https://www.bleepingcomputer.com/news/security/ethical-hacker-exposes-magyar-telekom-vulnerabilities-faces-8-years-in-jail/

An ethical hacker who discovered a security vulnerability in Magyar Telekom’s IT systems during April 2018 is currently being investigated by the Hungarian Prosecution Service after the company filed a complaint and faces 8 years in prison, local Hungarian media reports.

The security expert announced Magyar Telekom of the security issues affecting their systems 

allow potential attackers to &quot;access all public and retail mobile and data traffic and monitor the servers of the companies served by T-Systems,&quot; says Hungary Today.

HCLU previously helped defend other Hungarian white hats
HCLU further commented the case declaring that white hats shouldn&#039;t be prosecuted given that they are providing a service that, in the end, helps the entire society. On the other hand, the Hungarian Prosecutor&#039;s Office argues that the defendant &quot;crossed a line and due to the danger his actions may have posed to society, he must face the consequences of criminal law.&quot;]]></description>
		<content:encoded><![CDATA[<p>Ethical Hacker Exposes Magyar Telekom Vulnerabilities, Faces 8 Years in Jail<br />
<a href="https://www.bleepingcomputer.com/news/security/ethical-hacker-exposes-magyar-telekom-vulnerabilities-faces-8-years-in-jail/" rel="nofollow">https://www.bleepingcomputer.com/news/security/ethical-hacker-exposes-magyar-telekom-vulnerabilities-faces-8-years-in-jail/</a></p>
<p>An ethical hacker who discovered a security vulnerability in Magyar Telekom’s IT systems during April 2018 is currently being investigated by the Hungarian Prosecution Service after the company filed a complaint and faces 8 years in prison, local Hungarian media reports.</p>
<p>The security expert announced Magyar Telekom of the security issues affecting their systems </p>
<p>allow potential attackers to &#8220;access all public and retail mobile and data traffic and monitor the servers of the companies served by T-Systems,&#8221; says Hungary Today.</p>
<p>HCLU previously helped defend other Hungarian white hats<br />
HCLU further commented the case declaring that white hats shouldn&#8217;t be prosecuted given that they are providing a service that, in the end, helps the entire society. On the other hand, the Hungarian Prosecutor&#8217;s Office argues that the defendant &#8220;crossed a line and due to the danger his actions may have posed to society, he must face the consequences of criminal law.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/01/01/cyber-security-news-january-2019/comment-page-9/#comment-1623688</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Feb 2019 10:07:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181258#comment-1623688</guid>
		<description><![CDATA[Zack Whittaker / TechCrunch: 	
Apple restores Google&#039;s internal iOS apps after certificate misuse punishment  —  Apple has blocked Google from distributing its internal-only iOS apps on its corporate network after a TechCrunch investigation found the search giant abusing the certificates.

Apple restores Google’s internal iOS apps after certificate misuse punishment
https://techcrunch.com/2019/01/31/apple-ban-google-data-app/

Chance Miller / 9to5Mac: 	
Facebook says Apple has restored its access to enterprise certificates, bringing internal apps back online  —  Update: In a leaked memo obtained by Business Insider, Facebook continues to defend its Research app, as well as its decision to distribute it via enterprise certificates. 

Facebook says Apple has restored its access to enterprise certificates, bringing internal apps back online
https://9to5mac.com/2019/01/31/facebook-enterprise-certificates-online/

Update: In a leaked memo obtained by Business Insider, Facebook continues to defend its Research app, as well as its decision to distribute it via enterprise certificates.]]></description>
		<content:encoded><![CDATA[<p>Zack Whittaker / TechCrunch:<br />
Apple restores Google&#8217;s internal iOS apps after certificate misuse punishment  —  Apple has blocked Google from distributing its internal-only iOS apps on its corporate network after a TechCrunch investigation found the search giant abusing the certificates.</p>
<p>Apple restores Google’s internal iOS apps after certificate misuse punishment<br />
<a href="https://techcrunch.com/2019/01/31/apple-ban-google-data-app/" rel="nofollow">https://techcrunch.com/2019/01/31/apple-ban-google-data-app/</a></p>
<p>Chance Miller / 9to5Mac:<br />
Facebook says Apple has restored its access to enterprise certificates, bringing internal apps back online  —  Update: In a leaked memo obtained by Business Insider, Facebook continues to defend its Research app, as well as its decision to distribute it via enterprise certificates. </p>
<p>Facebook says Apple has restored its access to enterprise certificates, bringing internal apps back online<br />
<a href="https://9to5mac.com/2019/01/31/facebook-enterprise-certificates-online/" rel="nofollow">https://9to5mac.com/2019/01/31/facebook-enterprise-certificates-online/</a></p>
<p>Update: In a leaked memo obtained by Business Insider, Facebook continues to defend its Research app, as well as its decision to distribute it via enterprise certificates.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/01/01/cyber-security-news-january-2019/comment-page-9/#comment-1623682</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Feb 2019 09:59:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181258#comment-1623682</guid>
		<description><![CDATA[Airbus Suffers Data Breach, Some Employees&#039; Data Exposed
https://thehackernews.com/2019/01/airbus-data-breach.html

European airplane maker Airbus admitted yesterday a data breach of its &quot;Commercial Aircraft business&quot; information systems that allowed intruders to gain access to some of its employees&#039; personal information.]]></description>
		<content:encoded><![CDATA[<p>Airbus Suffers Data Breach, Some Employees&#8217; Data Exposed<br />
<a href="https://thehackernews.com/2019/01/airbus-data-breach.html" rel="nofollow">https://thehackernews.com/2019/01/airbus-data-breach.html</a></p>
<p>European airplane maker Airbus admitted yesterday a data breach of its &#8220;Commercial Aircraft business&#8221; information systems that allowed intruders to gain access to some of its employees&#8217; personal information.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/01/01/cyber-security-news-january-2019/comment-page-9/#comment-1623681</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Feb 2019 09:58:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181258#comment-1623681</guid>
		<description><![CDATA[APT reports	
Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities
https://securelist.com/chafer-used-remexi-malware/89538/

Throughout the autumn of 2018 we analyzed a long-standing (and still active at that time) cyber-espionage campaign that was primarily targeting foreign diplomatic entities based in Iran. The attackers were using an improved version of Remexi in what the victimology suggests might be a domestic cyber-espionage operation. This malware has previously been associated with an APT actor that Symantec calls Chafer.]]></description>
		<content:encoded><![CDATA[<p>APT reports<br />
Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities<br />
<a href="https://securelist.com/chafer-used-remexi-malware/89538/" rel="nofollow">https://securelist.com/chafer-used-remexi-malware/89538/</a></p>
<p>Throughout the autumn of 2018 we analyzed a long-standing (and still active at that time) cyber-espionage campaign that was primarily targeting foreign diplomatic entities based in Iran. The attackers were using an improved version of Remexi in what the victimology suggests might be a domestic cyber-espionage operation. This malware has previously been associated with an APT actor that Symantec calls Chafer.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/01/01/cyber-security-news-january-2019/comment-page-9/#comment-1623679</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Feb 2019 09:58:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181258#comment-1623679</guid>
		<description><![CDATA[This is how YouTube influencer scam artists operate
https://www.zdnet.com/article/this-is-how-youtube-influencer-scam-artists-operate/

The scams look credible but the only gift on offer is the loss of your personal data.

A scam striking the followers of YouTube influencers which offers lucky fans free gifts from their favorite stars has been in operation far longer than first thought.

Reports surfaced last week of the fraudulent scheme, in which YouTube influencers including Philip DeFranco, Jeffree Star, and Bhad Bhabie are being impersonated by scam artists seeking to cash in on their fame.

While the campaign appeared to be fairly new -- although low-bar -- researchers from RiskIQ believe that the scam could have been in operation since 2016.

On Wednesday, RiskIQ researcher Yonathan Klijnsma published a blog post examining the scam in detail.

YouTube Impersonation Scams Offering Fake Rewards are Running Wild
https://www.riskiq.com/blog/labs/youtube-impersonation-scams/]]></description>
		<content:encoded><![CDATA[<p>This is how YouTube influencer scam artists operate<br />
<a href="https://www.zdnet.com/article/this-is-how-youtube-influencer-scam-artists-operate/" rel="nofollow">https://www.zdnet.com/article/this-is-how-youtube-influencer-scam-artists-operate/</a></p>
<p>The scams look credible but the only gift on offer is the loss of your personal data.</p>
<p>A scam striking the followers of YouTube influencers which offers lucky fans free gifts from their favorite stars has been in operation far longer than first thought.</p>
<p>Reports surfaced last week of the fraudulent scheme, in which YouTube influencers including Philip DeFranco, Jeffree Star, and Bhad Bhabie are being impersonated by scam artists seeking to cash in on their fame.</p>
<p>While the campaign appeared to be fairly new &#8212; although low-bar &#8212; researchers from RiskIQ believe that the scam could have been in operation since 2016.</p>
<p>On Wednesday, RiskIQ researcher Yonathan Klijnsma published a blog post examining the scam in detail.</p>
<p>YouTube Impersonation Scams Offering Fake Rewards are Running Wild<br />
<a href="https://www.riskiq.com/blog/labs/youtube-impersonation-scams/" rel="nofollow">https://www.riskiq.com/blog/labs/youtube-impersonation-scams/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/01/01/cyber-security-news-january-2019/comment-page-9/#comment-1623677</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Feb 2019 09:55:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181258#comment-1623677</guid>
		<description><![CDATA[New security flaw impacts 5G, 4G, and 3G telephony protocols
https://www.zdnet.com/article/new-security-flaw-impacts-5g-4g-and-3g-telephony-protocols/

Researchers have reported their findings and fixes should be deployed by the end of 2019.

A new vulnerability has been discovered in the upcoming 5G cellular mobile communications protocol. Researchers have described this new flaw as more severe than any of the previous vulnerabilities that affected the 3G and 4G standards.

Further, besides 5G, this new vulnerability also impacts the older 3G and 4G protocols, providing surveillance tech vendors with a new flaw they can abuse to create next-gen IMSI-catchers that work across all modern telephony protocols.]]></description>
		<content:encoded><![CDATA[<p>New security flaw impacts 5G, 4G, and 3G telephony protocols<br />
<a href="https://www.zdnet.com/article/new-security-flaw-impacts-5g-4g-and-3g-telephony-protocols/" rel="nofollow">https://www.zdnet.com/article/new-security-flaw-impacts-5g-4g-and-3g-telephony-protocols/</a></p>
<p>Researchers have reported their findings and fixes should be deployed by the end of 2019.</p>
<p>A new vulnerability has been discovered in the upcoming 5G cellular mobile communications protocol. Researchers have described this new flaw as more severe than any of the previous vulnerabilities that affected the 3G and 4G standards.</p>
<p>Further, besides 5G, this new vulnerability also impacts the older 3G and 4G protocols, providing surveillance tech vendors with a new flaw they can abuse to create next-gen IMSI-catchers that work across all modern telephony protocols.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/01/01/cyber-security-news-january-2019/comment-page-9/#comment-1623676</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Feb 2019 09:55:07 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181258#comment-1623676</guid>
		<description><![CDATA[FBI Mapping &#039;Joanap Malware&#039; Victims to Disrupt the North Korean Botnet
https://thehackernews.com/2019/01/north-korea-hacker.html

The United States Department of Justice (DoJ) announced Wednesday its effort to &quot;map and further disrupt&quot; a botnet tied to North Korea that has infected numerous Microsoft Windows computers across the globe over the last decade.

Dubbed Joanap, the botnet is believed to be part of &quot;Hidden Cobra&quot;—an Advanced Persistent Threat (APT) actors&#039; group often known as Lazarus Group and Guardians of Peace and backed by the North Korean government.]]></description>
		<content:encoded><![CDATA[<p>FBI Mapping &#8216;Joanap Malware&#8217; Victims to Disrupt the North Korean Botnet<br />
<a href="https://thehackernews.com/2019/01/north-korea-hacker.html" rel="nofollow">https://thehackernews.com/2019/01/north-korea-hacker.html</a></p>
<p>The United States Department of Justice (DoJ) announced Wednesday its effort to &#8220;map and further disrupt&#8221; a botnet tied to North Korea that has infected numerous Microsoft Windows computers across the globe over the last decade.</p>
<p>Dubbed Joanap, the botnet is believed to be part of &#8220;Hidden Cobra&#8221;—an Advanced Persistent Threat (APT) actors&#8217; group often known as Lazarus Group and Guardians of Peace and backed by the North Korean government.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/01/01/cyber-security-news-january-2019/comment-page-9/#comment-1623673</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Feb 2019 09:53:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181258#comment-1623673</guid>
		<description><![CDATA[India’s largest bank SBI leaked account data on millions of customers
https://techcrunch.com/2019/01/30/state-bank-india-data-leak/

India’s largest bank has secured an unprotected server that allowed anyone to access financial information on millions of its customers, like bank balances and recent transactions.

The server, hosted in a regional Mumbai-based data center, stored two months of data from SBI Quick, a text message and call-based system used to request basic information about their bank accounts by customers of the government-owned State Bank of India (SBI), the largest bank in the country and a highly ranked company in the Fortune 500.]]></description>
		<content:encoded><![CDATA[<p>India’s largest bank SBI leaked account data on millions of customers<br />
<a href="https://techcrunch.com/2019/01/30/state-bank-india-data-leak/" rel="nofollow">https://techcrunch.com/2019/01/30/state-bank-india-data-leak/</a></p>
<p>India’s largest bank has secured an unprotected server that allowed anyone to access financial information on millions of its customers, like bank balances and recent transactions.</p>
<p>The server, hosted in a regional Mumbai-based data center, stored two months of data from SBI Quick, a text message and call-based system used to request basic information about their bank accounts by customers of the government-owned State Bank of India (SBI), the largest bank in the country and a highly ranked company in the Fortune 500.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/01/01/cyber-security-news-january-2019/comment-page-9/#comment-1623672</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Feb 2019 09:53:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181258#comment-1623672</guid>
		<description><![CDATA[Apple blocks Google from running its internal iOS apps
https://www.theverge.com/2019/1/31/18205795/apple-google-blocked-internal-ios-apps-developer-certificate

Google joins Facebook in Apple’s banning spree

Apple shut down Google’s ability to distribute its internal iOS apps earlier today. A person familiar with the situation told The Verge that early versions of Google Maps, Hangouts, Gmail, and other pre-release beta apps stopped working alongside employee-only apps like a Gbus app for transportation and Google’s internal cafe app. The block came after Google was found to be in violation of Apple’s app distribution policy, and followed a similar shutdown that was issued to Facebook earlier this week.

TechCrunch and Bloomberg’s Mark Bergen reported late Thursday that the apps’ functionality had been restored; Apple appears to have worked more closely with Google to fix this situation]]></description>
		<content:encoded><![CDATA[<p>Apple blocks Google from running its internal iOS apps<br />
<a href="https://www.theverge.com/2019/1/31/18205795/apple-google-blocked-internal-ios-apps-developer-certificate" rel="nofollow">https://www.theverge.com/2019/1/31/18205795/apple-google-blocked-internal-ios-apps-developer-certificate</a></p>
<p>Google joins Facebook in Apple’s banning spree</p>
<p>Apple shut down Google’s ability to distribute its internal iOS apps earlier today. A person familiar with the situation told The Verge that early versions of Google Maps, Hangouts, Gmail, and other pre-release beta apps stopped working alongside employee-only apps like a Gbus app for transportation and Google’s internal cafe app. The block came after Google was found to be in violation of Apple’s app distribution policy, and followed a similar shutdown that was issued to Facebook earlier this week.</p>
<p>TechCrunch and Bloomberg’s Mark Bergen reported late Thursday that the apps’ functionality had been restored; Apple appears to have worked more closely with Google to fix this situation</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/01/01/cyber-security-news-january-2019/comment-page-9/#comment-1623671</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Feb 2019 09:52:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181258#comment-1623671</guid>
		<description><![CDATA[Apple Allegedly Knew There Was a Critical Bug in FaceTime, Decided to Ignore It
User says he reported the issue to Apple a week ago
https://news.softpedia.com/news/apple-allegedly-knew-there-was-a-critical-bug-in-facetime-decided-to-ignore-it-524735.shtml?utm_source=spd_sidebar&amp;utm_medium=spd_newspage&amp;utm_campaign=spd_related

A major vulnerability in FaceTime allows anyone to see and hear contacts before they answer a group call, and Apple decided to suspend the feature completely until a fix is released.

And while the discovery has prompted an instant reaction of the Cupertino-based tech giant, it looks like the company actually knew there was a critical issue in Group FaceTime, only that it didn’t do anything about it.

Twitter user @MGT7500 posted a message on January 21 to warn of a major bug in FaceTime that would have enabled anyone to listen on contacts even when calls weren’t answered.

“My teen found a major security flaw in Apple’s new iOS. He can listen in to your iPhone/iPad without your approval. I have video. Submitted bug report to @AppleSupport...waiting to hear back to provide details. Scary stuff!” the original tweet reads.

&quot;Apple never answered&quot;

But as it turns out, Apple actually ignored the report and the company only acted to block exploits earlier today when the vulnerability made the headlines.]]></description>
		<content:encoded><![CDATA[<p>Apple Allegedly Knew There Was a Critical Bug in FaceTime, Decided to Ignore It<br />
User says he reported the issue to Apple a week ago<br />
<a href="https://news.softpedia.com/news/apple-allegedly-knew-there-was-a-critical-bug-in-facetime-decided-to-ignore-it-524735.shtml?utm_source=spd_sidebar&#038;utm_medium=spd_newspage&#038;utm_campaign=spd_related" rel="nofollow">https://news.softpedia.com/news/apple-allegedly-knew-there-was-a-critical-bug-in-facetime-decided-to-ignore-it-524735.shtml?utm_source=spd_sidebar&#038;utm_medium=spd_newspage&#038;utm_campaign=spd_related</a></p>
<p>A major vulnerability in FaceTime allows anyone to see and hear contacts before they answer a group call, and Apple decided to suspend the feature completely until a fix is released.</p>
<p>And while the discovery has prompted an instant reaction of the Cupertino-based tech giant, it looks like the company actually knew there was a critical issue in Group FaceTime, only that it didn’t do anything about it.</p>
<p>Twitter user @MGT7500 posted a message on January 21 to warn of a major bug in FaceTime that would have enabled anyone to listen on contacts even when calls weren’t answered.</p>
<p>“My teen found a major security flaw in Apple’s new iOS. He can listen in to your iPhone/iPad without your approval. I have video. Submitted bug report to @AppleSupport&#8230;waiting to hear back to provide details. Scary stuff!” the original tweet reads.</p>
<p>&#8220;Apple never answered&#8221;</p>
<p>But as it turns out, Apple actually ignored the report and the company only acted to block exploits earlier today when the vulnerability made the headlines.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
